CN1926534A - Method of managing digital rights - Google Patents
Method of managing digital rights Download PDFInfo
- Publication number
- CN1926534A CN1926534A CNA2005800063777A CN200580006377A CN1926534A CN 1926534 A CN1926534 A CN 1926534A CN A2005800063777 A CNA2005800063777 A CN A2005800063777A CN 200580006377 A CN200580006377 A CN 200580006377A CN 1926534 A CN1926534 A CN 1926534A
- Authority
- CN
- China
- Prior art keywords
- digital media
- network
- code
- initialization
- license number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000001514 detection method Methods 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 claims description 3
- 238000009434 installation Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 108010022579 ATP dependent 26S protease Proteins 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A method of managing digital rights in a network without a central license server where each instance of the program broadcasts its identification into the network, and any instance of the program detecting its own license code from another node closes down. A closing program may also generate a close down message to the conflicting program.
Description
Instructions
Technical field
The present invention relates generally to for example use of program (program), art, literature or the musical works on the network of the Digital Media that permits on the Control Network.
More particularly, the present invention relates to control program, software or the permission of multimedia item purpose, copy during wherein registration is not used and the central repository of using according to the essential record limiting permission (central repository).
Background technology
Program is relevant with the permission that is generally license number or key form usually, and purpose is that when installation procedure, by the license number of user's key entry, program can not moved.Similarly, multimedia dish or similar project can comprise license number to distinguish individual copy, and this copy is intended to by only people's use.
Purpose is to control the program in the use or the undelegated quantity of duplicating of multimedia dish or file; Yet such system does not prevent to have the program of identical license number or copy the repeating on the various computing machine of identical multimedia dish or file installed.
The unauthorized copying of known control program permission originally is installed in for example method on router and the interchanger of computing machine or similar terms.Usually, the initialization by detecting the computing machine on the network and confirm the use of the permission on this computing machine for the main tabulation of permission is operated it.
Do not having monitoring or distributing the central server of permission, for example under the situation of ad hoc deployed wireless networks, such system can not work.
The invention provides a kind of solution to this problem and other problem, it provides the advantage that is better than prior art, or it provides the selection of usefulness at least to the public.
Summary of the invention
In an example, the invention reside in for example method of the authority of program of a kind of management access or operation Digital Media, it is included in the user agent under the network environment, and described method comprises:
During initialization, detect network packet, it is included in the license number information of other described program of moving on the network; With
When the license number that is detected is identical with the license number that just is being initialised, stop initialization to continue, or
When license number that is detected and the license number that just is being initialised are inequality, allow program initialization, then described license number is broadcast to network with packet.
Preferably, described program is duplicated the bag forward of other example of the described program of other place's operation on the comfortable network when being initialised.
Preferably, when receiving the bag that comprises the license number identical with the license number that just is being initialised, the packet broadcast that will have " stopping " order receives described ceasing and desisting order to described network in the computing machine with version operation, and causes that described program stops.
Preferably, described user agent can embed in multimedia dish or the file.
In further example, the present invention relates to the method that a kind of generation is used for the license number of program, it comprises:
Produce unique permission code;
Produce Validation Code from described permission code, and it is linked to described permission code;
Encrypt the code that is linked, and described Digital Media is distributed it.
Method as claimed in claim 4 comprises from the code generation personal code work of being encrypted.
A kind of computing machine, when the user agent of working procedure, other example of its above program of user agent's recognition network during initialization, one comparer, it compares the permission code of other example of the described program on the described network and the permission code of initialization version, one initialization is called, if do not find described permission code, the described program of its initialization then, and broadcast the permission code and a detecting device of described program, when finding identical permission code, it detects sure comparison, and stops the initialization of described program.
Preferably, described comparer also can from the initialization on the computing machine that just uses identical license number call detection " stop " instruction.
Preferably, under the situation that is detected described sure comparison by detecting device, network interface will " stop " indication and be broadcast to the original subscriber agency.
Preferably, described user agent can embed in multimedia dish or the file.
Understanding under following detailed description and the situation of checking relevant accompanying drawing, outstanding these and other feature of the present invention and advantage will become obvious.
Description of drawings
Fig. 1 is the process flow diagram that produces the method for unique program identification key.
Fig. 2 is the block scheme that authenticating computer has the method for effective procedure permission.
Fig. 3 is authenticating computer continue the to remain valid block scheme of method of program permission.
Description of the invention
The inventive method offers the software of user agent's permission or the special item of multimedia file or dish, and its agency appears on each computing machine that uses software or play multimedia project.During the initialization that software itself is installed or the multimedia dish is play, usually the agency can be set.Managed network is not wired or wireless, if computing machine is connected to this network, then acts on behalf of broadcast or multicast packet constantly.Packet comprises the identifier of the permission that is used for this software.
The computing machine of attempting initializers when computing machine is connected to network will wrap monitoring network bags to those that are produced by the same agent on other computing machine, and extract permission flag symbol from those bags.Comparison shows that if this identifier is identical with identifier on the initializing computer, the agency can the refusal initializers so, is because this permissively duplicates installation.
The packet of broadcasting is created has typical TTL (life span), if therefore network is big, it can not advance far, however all bags that each agency can replay and be used for this software, thus increase for the active block radius of permitting.Packet is typically, and each bag carries identification number, and can not send the bag that has been sent out again.
Preferably,, produce the permission code that is used for software at first by producing unique code (unique code) as initial permission code, this code record in database and with all previous number comparisons to guarantee that it in fact is unique.Then, this code is depended on the second code of first code by hash or other convolution with generation.Then, two codes are linked and are filled or intercepted the length for being suitable for encrypting.In case encrypted, the code of last gained can be used as the authentication code of an example (instance) that is used for software.The further reversible convolution of the code of last gained can be used for producing ASCII user's readable code, and it can be used as the license key that the user can key between the software installation period.
Whenever,, be divided into hash part and identification division, produce hash-code again and partly compare from identification division then with the hash that is received by deciphering, but Validation Code.
Fig. 1 shows, 101, generally produces ID (but being noted that this generator produces hexadecimal code rather than simple number) by pseudorandom number generator.102, the code number compares with the code of those in database number, and if unique, store this number so.104, generation is used to verify the hash of the number of being stored or similar code, and it is linked to this code.
Then, 105, the hash of encrypted combination and code, and the result is the key that is used for program, 106, it can embed in the program or be for good and all additional with a certain alternate manner.107, produce the intelligible key version of user, and this version can place routine package, or be included in the program, thereby during program is installed in computing machine at first, can use it.
Fig. 2 is presented at the processing procedure during each initialization of the program on the subscriber computer.201, the agency that the program that at first is invoked at is installed in installing, and, read in the packet (UDP or TCP) of all inputs of network input 202, and seek and carry the bag of such content, promptly discerning itself is the broadcast packet that carries required type program ID.When detecting such bag,, check that it is to determine whether this ID is identical with the ID that just manages initialized program 203.If like this, be controlled at 204 and forward wrong output to, its representation program is installed on the network, and closes start-up routine (initialization routine).Yet before carrying out this, bag can be sent on the network, and its object that has is " stopping " message for other computing machine and the content of operation identical license number.When other generation of computers reason detects " stopping " message that is used for its oneself license number, this example of its shut down procedure.
If in associated packet, do not detect this ID, finish program initialization 205 so, and recognition agent is broadcast to network with program ID then, with the permission example that prevents that any other computer initialization is identical.
Under the situation that permission and multimedia dish or file are got in touch, by attempting to play this dish or file comes the invoke user agency.
How Fig. 3 display routine checks the use of its license number on network periodically when instantiation.As 301, when program run,, carry out cycle detection 302 by detecting 303 whether identical permission embeds in the sign bag that appears on the network.If find identical license ID, so 304, shut down procedure, otherwise it proceeds to 305, and in addition its oneself license ID is broadcast to network.
The agency can regenerate packet fully, and it is transferred back to network, or can produce the packet with the TTL that cuts a counting again according to normal conditions, and therefore the restriction bag is by the scope of network transmission.Although what can expect is detect all examples of the program on the network, and prevent any use of copy, yet in order to reduce network traffics, constantly copy package may be unactual on network.
Should be appreciated that, though in above-mentioned instructions, stated many feature and advantage of various embodiments of the present invention, and the 26S Proteasome Structure and Function details of various embodiments of the present invention, yet the disclosure only is exemplary, and, just can at length change as long as function of the present invention does not affect adversely.For example, under the situation that does not change the spirit and scope of the present invention, the concrete enforcement with packet of included key can be dependent on its concrete application that is used and changes.
In addition, although preferred embodiment described herein is directed to the bag that is used in TCP or UDP packet system, yet it should be appreciated by those skilled in the art that under situation about not departing from the scope of the present invention with spirit, instruction of the present invention can be applicable to for example NETBEUI of other system.
Industrial applicibility
Digital Media of the present invention permission control can be used in the network of any kind, with the restriction Digital Media for example use of the duplicate that is duplicated of program, or represents user's other example of working procedure or visit digital material by rights in addition.Therefore, the present invention is industrial applicable.
Although with reference to program description a plurality of examples, yet the present invention need can be applicable to any type of Digital Media of permission control, comprises literature, art, musical works and multiple program, database and can have other works of intellecture property.
Claims (11)
1. comprise the method for user agent's Digital Media authority under the supervising the network environment, it comprises:
During initialization, detect the network packet of the license number information that is included in other the such Digital Media that moves on the network, this other described Digital Media comprises program; With
When the license number that is detected is identical with the license number that just is being initialised, stop initialization to continue, or
When license number that is detected and the license number that just is being initialised are inequality, allow the Digital Media initialization, then described license number is broadcast to described network with packet.
2. the method for claim 1, wherein said Digital Media when being initialised, duplicate from visited or on described network the bag forward of other example of the described Digital Media of other place's operation.
3. the method for claim 1, the program of wherein said Digital Media on described network, moving.
4. method as claimed in claim 3, it comprises:
When receiving the bag that comprises the license number identical with the license number that just is being initialised, the packet broadcast that will have " stopping " order receives described ceasing and desisting order to described network in the computing machine with version operation, and described program is stopped.
5. a generation is used for the method for the license number of Digital Media as claimed in claim 1, and it comprises:
Produce unique permission code;
Produce Validation Code from described permission code, and it is linked to described permission code;
Encrypt the code that is linked, and described Digital Media is distributed it.
6. method as claimed in claim 5, it comprises the code generation personal code work from described encryption.
7. the method for claim 1, wherein said user agent embeds in multimedia file or the dish.
8. computing machine, when operation Digital Media for example during the user agent of program, other example of its above Digital Media of user agent's recognition network during initialization, one comparer, it compares the permission code of other example of the described Digital Media on the described network and the permission code of initialization version, one initialization is called, if do not find described permission code, the described Digital Media of its initialization then, and broadcast the permission code and a detecting device of described Digital Media, when finding identical permission code, it detects sure comparison, and stops the initialization of described Digital Media.
9. computing machine as claimed in claim 8, wherein said comparer also can call detection from the initialization on the computing machine that just uses identical license number and " stop " instruction.
10. computing machine as claimed in claim 8 is wherein being detected by described detecting device under the situation of sure comparison, and network interface will " stop " indication and be broadcast to the original subscriber agency.
11. computing machine as claimed in claim 8 wherein calls described user agent from multimedia dish or file.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US48184403P | 2003-12-31 | 2003-12-31 | |
US60/481,844 | 2003-12-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1926534A true CN1926534A (en) | 2007-03-07 |
CN100447775C CN100447775C (en) | 2008-12-31 |
Family
ID=34748724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005800063777A Expired - Fee Related CN100447775C (en) | 2003-12-31 | 2005-01-03 | Method of managing digital rights |
Country Status (6)
Country | Link |
---|---|
US (1) | US7854011B2 (en) |
JP (1) | JP4875498B2 (en) |
CN (1) | CN100447775C (en) |
CA (1) | CA2552237A1 (en) |
TW (1) | TWI324875B (en) |
WO (1) | WO2005065434A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256605A (en) * | 2006-08-31 | 2008-09-03 | 埃森哲环球服务有限公司 | Enterprise entitlement framework |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100555939C (en) * | 2006-09-20 | 2009-10-28 | 北京飞天诚信科技有限公司 | A kind of based on network method for protecting software |
US8839444B2 (en) * | 2011-03-31 | 2014-09-16 | Kaspersky Lab Zao | Automatic analysis of software license usage in a computer network |
US8683603B2 (en) | 2011-10-20 | 2014-03-25 | Avaya Inc. | Centralized administration-based licensing system |
US8789209B2 (en) | 2012-03-07 | 2014-07-22 | Avaya Inc. | Enterprise license registrar anchor point |
US8953479B2 (en) * | 2012-08-07 | 2015-02-10 | Ca, Inc. | System and method for license enforcement for data center monitoring applications |
US10528707B2 (en) | 2015-06-15 | 2020-01-07 | Samsung Electronics Co., Ltd. | Enabling content protection over broadcast channels |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08286906A (en) * | 1995-04-18 | 1996-11-01 | Fujitsu Ltd | Automatic check method for number of starting programs |
DE69618672T2 (en) * | 1995-10-09 | 2002-08-14 | Matsushita Electric Industrial Co., Ltd. | Optical disc for use in an encryption or program license system |
US5960085A (en) * | 1997-04-14 | 1999-09-28 | De La Huerga; Carlos | Security badge for automated access control and secure data gathering |
JPH117400A (en) * | 1997-06-16 | 1999-01-12 | Mitsubishi Electric Corp | System for measuring program work number, its method and recording medium recording program work number measuring program |
US6061794A (en) | 1997-09-30 | 2000-05-09 | Compaq Computer Corp. | System and method for performing secure device communications in a peer-to-peer bus architecture |
US6170744B1 (en) * | 1998-09-24 | 2001-01-09 | Payformance Corporation | Self-authenticating negotiable documents |
US6550012B1 (en) | 1998-12-11 | 2003-04-15 | Network Associates, Inc. | Active firewall system and methodology |
EP1076279A1 (en) * | 1999-08-13 | 2001-02-14 | Hewlett-Packard Company | Computer platforms and their methods of operation |
JP4595182B2 (en) * | 2000-09-07 | 2010-12-08 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program providing medium |
JP2002222021A (en) * | 2001-01-25 | 2002-08-09 | Hitachi Information Technology Co Ltd | License managing method for software and storage medium |
US20020166063A1 (en) * | 2001-03-01 | 2002-11-07 | Cyber Operations, Llc | System and method for anti-network terrorism |
CN1326348C (en) * | 2001-05-29 | 2007-07-11 | 松下电器产业株式会社 | Insurance system |
WO2003034313A2 (en) * | 2001-10-18 | 2003-04-24 | Macrovision Corporation | Systems and methods for providing digital rights management compatibility |
US7322042B2 (en) * | 2003-02-07 | 2008-01-22 | Broadon Communications Corp. | Secure and backward-compatible processor and secure software execution thereon |
US20040235521A1 (en) * | 2003-05-01 | 2004-11-25 | Salil Pradhan | Method and system for exchanging digital media |
JP2005301525A (en) * | 2004-04-08 | 2005-10-27 | Olympus Corp | Software with license checking function, and method for managing license of software |
-
2004
- 2004-12-31 TW TW093141699A patent/TWI324875B/en not_active IP Right Cessation
-
2005
- 2005-01-03 US US10/584,764 patent/US7854011B2/en not_active Expired - Fee Related
- 2005-01-03 CA CA002552237A patent/CA2552237A1/en not_active Abandoned
- 2005-01-03 CN CNB2005800063777A patent/CN100447775C/en not_active Expired - Fee Related
- 2005-01-03 WO PCT/US2005/000079 patent/WO2005065434A2/en active Application Filing
- 2005-01-03 JP JP2006547611A patent/JP4875498B2/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256605A (en) * | 2006-08-31 | 2008-09-03 | 埃森哲环球服务有限公司 | Enterprise entitlement framework |
CN101256605B (en) * | 2006-08-31 | 2013-03-06 | 埃森哲环球服务有限公司 | Enterprise entitlement framework |
Also Published As
Publication number | Publication date |
---|---|
TWI324875B (en) | 2010-05-11 |
WO2005065434A2 (en) | 2005-07-21 |
JP2007517341A (en) | 2007-06-28 |
WO2005065434A3 (en) | 2006-03-02 |
TW200537890A (en) | 2005-11-16 |
US20080028471A1 (en) | 2008-01-31 |
CN100447775C (en) | 2008-12-31 |
JP4875498B2 (en) | 2012-02-15 |
US7854011B2 (en) | 2010-12-14 |
CA2552237A1 (en) | 2005-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bellare et al. | Forward integrity for secure audit logs | |
JP3982857B2 (en) | System and method for protecting the use of dynamically linked executable modules | |
Park et al. | Soft tamper-proofing via program integrity verification in wireless sensor networks | |
US8769296B2 (en) | Software signature tracking | |
Kim et al. | The design and implementation of tripwire: A file system integrity checker | |
US7003672B2 (en) | Authentication and verification for use of software | |
US7805765B2 (en) | Execution validation using header containing validation data | |
US20020016925A1 (en) | Method and system for controlling and filtering files using a virus-free certificate | |
US8175269B2 (en) | System and method for enterprise security including symmetric key protection | |
US20080208754A1 (en) | Method for detecting duplicated instances of a software license | |
US6952770B1 (en) | Method and apparatus for hardware platform identification with privacy protection | |
CN1694032A (en) | Method and system for bootstrapping a trusted server having redundant trusted platform modules | |
CN1726668A (en) | System and method for securely installing a cryptographic system on a secure device | |
CN1610886A (en) | System and method for verification | |
CN1729457A (en) | System and method to proactively detect software tampering | |
CN101065716A (en) | Method and device for verifying the integrity of platform software of an electronic device | |
CN1794258A (en) | Method of preoenting software non-authorized use by using network card physical address | |
CN112764827B (en) | Java class hot loading method with safety verification | |
CN112688919A (en) | APP interface-based crawler-resisting method, device and medium | |
US20050154899A1 (en) | Mobile software authentication and validation | |
Staddon | Dynamic inference control | |
US20020152396A1 (en) | Method for secure restoration of a database stroring non-secure content | |
CN1516836A (en) | Software secure authenticated channel | |
CN1926534A (en) | Method of managing digital rights | |
JP4664055B2 (en) | Program dividing device, program executing device, program dividing method, and program executing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081231 Termination date: 20130103 |